General

  • Target

    d5a9ac5bb4ec71dd952250b5421f3bb38e0b94110de36d413a28704b5d3c599fN

  • Size

    31KB

  • Sample

    241022-2amn6azaqp

  • MD5

    adaa3ae98fad53f8cfb54266fdc4f710

  • SHA1

    56ec60bc09c0510ec0f5d60aa6d7662a6d273804

  • SHA256

    d5a9ac5bb4ec71dd952250b5421f3bb38e0b94110de36d413a28704b5d3c599f

  • SHA512

    dfb4076abd2de0b1b1fd3408f45505c363fcd3e74ae649778d07b4cdb4f4a687b9bc77177ca0c28b82a67f5ccadbd7237471f4cc96ee5bee5220f98a1a34738c

  • SSDEEP

    768:ilS569DdxkzxP6bYMCG3VQNvqjQmIDUu0tiFBj:Xqq27icQVkOj

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

explorer

C2

154.197.69.22:6502

Mutex

032d537ea8a490a45dedf853e1d3dc09

Attributes
  • reg_key

    032d537ea8a490a45dedf853e1d3dc09

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      d5a9ac5bb4ec71dd952250b5421f3bb38e0b94110de36d413a28704b5d3c599fN

    • Size

      31KB

    • MD5

      adaa3ae98fad53f8cfb54266fdc4f710

    • SHA1

      56ec60bc09c0510ec0f5d60aa6d7662a6d273804

    • SHA256

      d5a9ac5bb4ec71dd952250b5421f3bb38e0b94110de36d413a28704b5d3c599f

    • SHA512

      dfb4076abd2de0b1b1fd3408f45505c363fcd3e74ae649778d07b4cdb4f4a687b9bc77177ca0c28b82a67f5ccadbd7237471f4cc96ee5bee5220f98a1a34738c

    • SSDEEP

      768:ilS569DdxkzxP6bYMCG3VQNvqjQmIDUu0tiFBj:Xqq27icQVkOj

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks